Training

Data Breach Prevention and Response Summit , Events , Governance & Risk Management

Phase 1 - Establishing a Security Baseline - Inside and Out

Phase 1 - Establishing a Security Baseline -  Inside and Out

Even though many traditional defense mechanisms can be circumvented, it is essential that a proactive, layered, defensive security program be put in place and managed effectively. This will not prevent the well-organized targeted attacks, but will eliminate 99 percent of the background noise and most of the less sophisticated attacks. We're going to review the current thinking, with regards to establishing a baseline defense, from two different viewpoints:

See Also: The State of Organizations' Security Posture as of Q1 2018

  • External/Ingress - A whole host of technologies exist for establishing a hardened perimeter and a layered defense. We'll discuss how legacy strategies can be adapted to meet the new threats and how best to eliminate as many of these attack vectors as possible.
  • Internal/Egress - A very high proportion of attacks have a significant "internal" component that was either actively engaged, or blissfully ignorant of their participation, in the locating and exfiltration of data. We'll discuss how internal assets of all types are used for malicious purposes and what mechanisms should be considered for sealing egress paths from the inside.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

Background

Slide Previews

Slide Previews

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access
Have an account? Sign in.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.